You are here

PHOENIX CONTACT WLAN Capable Devices Using the WPA2 Protocol (ICSA-17-325-01)

PHOENIX CONTACT WLAN Capable Devices Using the WPA2 Protocol (ICSA-17-325-01)

Created: Tuesday, November 21, 2017 - 15:15
Categories:
Cybersecurity

ICS-CERT has released an advisory on a PHOENIX CONTACT WLAN capable devices using the WPA2 Protocol vulnerability. Numerous versions of these devices are affected. Successful exploitation of this vulnerability could allow an attacker to operate as a “man-in-the-middle” between a device and a wireless access point. PHOENIX CONTACT has reported that users operating embedded devices in AP mode are not affected by these vulnerabilities and that it is actively working on discovering how these vulnerabilities affect its products and plans to release future updates as they become available. PHOENIX CONTACT recommends that users apply the security update provided by Microsoft for devices running Microsoft Windows. Additionally, ICS-CERT recommends a series of defensive measures to minimize the risk of exploitation of the vulnerability. ICS-CERT.